McAfee in a recent report said enterprises expect to see an increase in attacks aimed at shared resources in any IaaS, PaaS, or SaaS (Infrastructure, Platform, or Software as a Service) cloud environment. Cybercriminal will target cloud-based applications and data repositories such as the ubiquitous hypervisors found in all data centers, the multitenant communications infrastructure…

PayPal, Nok Nok Labs, Agnitio, Validity Sensors, Lenovo and Infineon Technologies formed a coalition called the Fast Identity Online (FIDO) Alliance to develop a standards-based open approach that automatically detects when a FIDO-enabled device is present and offers users the option to replace passwords with more secure authentication techniques such as biometrics. Google, Microsoft, Salesforce.com,…

Organizations are more than ever exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change in the enterprises by supplying intelligence-driven models. Research firm Gartner said that big data analytics will play a crucial role in detecting crime and security…

McAfee Labs has published a report with the predictions of threats in 2014 (McAfee Labs 2014 Threats Predictions), where in the list along with the apocalyptic threat of cyber-attacks on infrastructure, big data, and PC, there is also an attack on data breaches and data loss, denials of service, and malicious uses. Many of the…

In spite of the widespread belief that bringing data on the systems to an external service provider would create doubts on security, Gartner believes that the market for cloud security is among those set to grow more in recent years. According to Gartner report, the market for cloud-based security will hit $ 2.1 billion global…

The demand for cloud computing is strengthen when the companies have reached the awareness that they need to provide innovative IT services while reducing costs. The cloud model promotes investment in technology, allowing scheduling, provisioning, with a rapid and dynamic management of virtualized computing resources on demand. IBM has supported thousands of clients around the…

Cloud-based systems are attractive as a standard part of the corporate landscape, because they are usually cheaper, faster and easier to deploy than internal IT systems. The path to the cloud is a must for most enterprise, however, an assessment of information risk precede that takes into account the complexities of cloud systems, the data…

With the aim of offering an assessment of the current situation of mobile computing and current threats to protect them, the Cloud Security Alliance (CSA) has published a guide specializing in critical areas with recommendations on best practices in this area. The CSA has updated its Cloud Control Matrix (CCM) with recommendations of best practices…

Cloud business solutions have been growing at a skyrocketing speed especially Software-as-a-Service (SaaS). Companies, however, need to realize that cloud contracts have a lot of security loopholes that need to be addressed ASAP. Cloud contracts have a lot of growing up to do according to the results of the new research conducted by Gartner. Business…